A Practical Chosen Message Power Analysis Approach against the Key Whitening Layers on the Loop Architecture

نویسندگان

  • Chenyang Tu
  • Lingchen Zhang
  • Neng Gao
  • Zeyi Liu
  • Yuan Ma
  • Zongbin Liu
چکیده

In practice, the key whitening layer is a commonly adopted structure in symmetric ciphers, and the loop architecture is widely applied in hardware implementation of these ciphers. Up to now, conventional DPA is hard to recover the key of such ciphers, since the key whitening layer hides the input (output) of the first (last) round from the plaintext (ciphertext). In this paper, we propose a practical chosen message power analysis approach against the loop architecture of ciphers with the key whitening layers. The starting point of the new approach is the delicate selection of the plaintext set in a chosen message manner, which decreases the space of the plaintext to a reasonable size within the ability of DPA. After choosing the plaintext, we can recover the whitening key through fully exploiting the intermediate variable which is mixed up with the round key and the whitening key. More precisely, we take the round key and the whitening key as a unity and recover it by the chosen message DPA, and then derive the whitening key according to the relationship between the whitening key and the unity. Finally, we can derive the master key from the whitening keys. In order to further manifest the validity of the new approach, we carry extensive experiments on two ISO standardized ciphers CLEFIA and Camellia implemented in loop architecture on FPGA, and the keys are recovered as expected.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers

The key whitening is a technique intended to enhance the strength of a block cipher. Although some research work involves DPA attacks against the key whitening layer in the compact architecture, there are no literatures dedicated in the influence of the key whitening layers in the loop architecture from the standpoint of DPA. In this paper, we propose a practical chosen message power analysis a...

متن کامل

A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia

The Feistel-SP structure is a commonly adopted structure in symmetric cryptography with many practical instances. Differential power analysis (DPA) has proven to be effective against these ciphers with compact implementations within these years. However, the applications of DPA on Feistel-SP ciphers with loop hardware implementations are more complicated and less evaluated in literature, mainly...

متن کامل

Evaluation the theories of semiotics approach in the Reading of Architecture and Urbanism

This essay is considered an attempt to present how semiotic studies can be used as a perceptional aspect in reading architecture and urbanism. Appearance of each art is similar to creation of a “text” which transfers a set of customs, values and thought together with itself. Production of each “text” is based on its context, culture and intellectual bed of its origin society. Each text is an ...

متن کامل

Differential Power Analysis: A Serious Threat to FPGA Security

Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...

متن کامل

A New Approach for Solving Grey Assignment Problems

Linear assignment problem is one of the most important practical models in the literature of linear programming problems‎. ‎Input data in the cost matrix of the linear assignment problem are not always crisp and sometimes in the practical situations is formulated by the grey systems theory approach‎. ‎In this way‎, ‎some researchers have used a whitening technique to solve the grey assignment p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016